0% found this document useful (0 votes)
37 views37 pages

Module 2 Part C Application Controls

This document discusses application controls, with a focus on input controls. It defines application controls as procedures and programs designed to satisfy users for a specific task, both manual and automated controls within an application. The primary objective is to prevent or detect errors when transactions are input, processed, or output generated. Input controls are necessary to ensure only valid, accurate and complete data and master file changes are entered. Failure to have effective input controls could lead to unauthorized or erroneous transactions and data.

Uploaded by

Zwivhuya Maimela
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views37 pages

Module 2 Part C Application Controls

This document discusses application controls, with a focus on input controls. It defines application controls as procedures and programs designed to satisfy users for a specific task, both manual and automated controls within an application. The primary objective is to prevent or detect errors when transactions are input, processed, or output generated. Input controls are necessary to ensure only valid, accurate and complete data and master file changes are entered. Failure to have effective input controls could lead to unauthorized or erroneous transactions and data.

Uploaded by

Zwivhuya Maimela
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

Module 2:

Introduction to risks and


internal controls in a
computerised environment
PART C- APPLICATION
CONTROLS

Chapter 5: Auditing Fundamentals


T Koza
APPLICATION CONTROLS
Application controls: Background

• Application controls defined


• An application-Is a set of procedures and programmes
designed to satisfy all users associated with a specific task.
 Manual and automated controls
 Within a particular application (e.g. sales, debtors)
 Provide reasonable assurance that recorded transactions are:
– Valid i.e. are genuine and have been authorised
– Accurate
– Complete
Application controls:
Background
People
Users, clients ,customers and
technicians
Primary objective of
application controls
To prevent, or detect and
correct misstatements arising
when a transaction is:
Processing Output
Input Working with
• Input Sending results,
Data collected, information, changing reporting and
• Processed captured distributing data
and calculating
• Output generated

Storage
Data base, files, discs, tapes
Application controls: Background…………..continued

• Thus, application controls


implemented around:
 Input: capturing and recording of
information

 Processing of data within


computer

 Distribution of output

 Changes to master file data.


Application controls: Background…………..continued
Controls regarding
•Recording data on documents
•The screen
•Capturing of data
•Electronic logs to be maintained
•The error correction process

Controls regarding
•Ensuring the correct data, files and
programs are used
•Calculating control total
•Programming of the software
•Electronic logs to be maintained, reviews to
be performed

Controls regarding
•Correctness of generation of output
•Proper distribution of output
•The receipt of output
•Electronic logs to be maintained and
reviews
Manual vs computer controls

 Three types of application controls in this context:

Independent IT dependent Programmed


manual controls manual controls Controls
•Performed •Dependant on output •Solely dependant and
independently of the produced by the performed by the
computer system computer system computer system and
•e.g. secure entry//exit •e.g. review by a operate without any
points to safeguard manager of an activity human interaction
assets from theft log/register extracted •e.g. authentication
from the system and validation tables
.refer to next slide
Programmed
control/automated controls
example……continued

Example
Authentication tables granting
access to the system,
validation control
• (such as sign tests and field
length tests) in which the
computer checks all data
captured against pre-
programmed criteria
Class Question 3: Source -Graded Questions on Auditing 2017
The following controls have been implemented at GoodReads (Pty) Ltd, a large book wholesaling company which has a fully
computerised accounting system.

1. When a delivery is made from a supplier to GoodReads (Pty) Ltd, the receiving clerk enters the order number for the goods into the
system. If the order number is not valid, the receiving clerk will not accept the delivery.

2. A new employee cannot be successfully added to the employee masterfile without a valid income tax reference number being
entered.

3. GoodReads (Pty) Ltd recently appointed a committee to monitor and advise on the specific risks faced by the IT department.

4. When an application programme change request is made by a user department, it must be approved by the IT steering committee
and the head of the user department before it is effected.

5. All creditors are paid by electronic funds transfer. To effect a transfer, two senior employees must independently enter their unique
passwords.

6. Entry to GoodReads (Pty) Ltd’s data centre (which houses important hardware) is restricted. Swipe cards and PIN numbers are used to
limit access.

7. The company makes use of firewall and anti-virus software.

8. A purchase order must be supported by a stores requisition signed by the warehouse controller.

9. If a debtor has not paid its account within two working days of exceeding its credit terms, for example 60 days, Barry Potter the credit
controller, contacts the debtor to request payment.

10. The chief information officer conducts regular meetings with IT personnel on an individual basis, to enforce the importance of a
strong ethical culture and discuss ethical situations which may have arisen.

YOU ARE REQUIRED TO indicate whether each of the controls listed under 1 to 10 above, is a general control or an application control.
For those controls which you identify as general controls, indicate the category of general control to which each relates.
Class Discussion Question (Input
Controls)
• Refer to Question in the course notes.
Overview of application controls
 Chapters 6 to 10: practical application of detailed application controls
 Revenue and receipts cycle
 Purchases and payments cycle
 Inventory and production cycle
 Human resources cycle
 Never in isolation to general controls!
 Key areas in application controls:

Input Processing Output

Master file changes


Overview of application • Example of a purchase order created on the
controls…..continued system

Input Controls.
• Objective: data entered
and Masterfile changes are
valid, accurate and
complete
• E.g. correct information, no
duplications, not fictitious, all
input entered.
• Must also address rejected
input
• Consequences if input
controls fail. Refer to next
slide
Input
Controls…..continued
Class Example
Consider asking a friend to be
your answer, make calls and • Failure to address input process
send message on your phone. effectively will result in:
This is what might happen:
• Unauthorised transactions
• The person may make
unauthorised calls to her being entered
friends or family using your
airtime
• Data already in the system
• Person may delete your being added to or deleted
pictures, apps or important
messages
• Errors occurring during the
• Person may download app
that are against your taste creation of data
• Person may send improper
messages to your contacts • Data being lost
e.g. forward them group
messages
• Class to discuss measures to
avoid the situation
mentioned above
Input controls…….. continued
• Input controls are necessary over:
. • Data capturer • Computer
‘screen’

Controls over: The computer


the person screen that aids
capturing the the person
document or capturing the
data and the document
hard copy (known as
document screen aids

This is done by
This is done to means of controls
programmed into
identify and
the software
correct any (known as logical
errors timeously programmed
controls)
• Management • Computer
review of the ‘screen …
data continued’
Input controls…… (continued)

• Input controls are achieved • Example of logical programmed


through the following: controls
• User-related/manual controls
• Documentation
Hash
• Screen aids Sign test
Totals
• Logical programmed controls
─ E.g. validity test, limit,
alphanumeric, reasonability Seque Field
etc. nce length
• Review, reporting and check test
exception monitoring
• Batch controls: Matchin
Reaso
g
– Input, control totals, control nablen
(Relate
sheets, register. ess
d data
Check
test
Examples of logical programmed controls……..continued

Alphabetic/alphanumeri
Limit test or range
Validity test c/numeric character
test check

Only allow as
Confirms data alphabetic Test the data
entered on system characters or only against a threshold
against a Masterfile numeric characters or predetermined
to ensure validity or an error message benchmark
will pop up

e.g. debtor account


e.g. a debtor is not
number is entered
allowed to incur
and compared to e.g. An ID field that
further debt is
the account should contain only
his/her credit limit
number stored in numeric characters
threshold has been
the debtor
reached
masterfile

Read Chapter 5 page 167-170 of Auditing Fundamentals for more examples


Input controls : Comparison of manual vs computerised

Manual Environment Computerised Environment


1. Record Procedures 1. Record Procedures
– Manual comparisons are performed – Program makes the comparisons between
to confirm the correctness of the the data captured and the information
already stored in the computer’s memory.
details e.g. data on received note is matched to
data on the order form
2. Authorisation and approval
– Approval is done by a senior member 2. Authorisation and approval
through signing a document – A programmed task will not proceed if
approval has not been granted by a senior
3. Reconciliation's and independent staff through capturing his/her username
and password
review
– Staff member performs comparisons 3. Reconciliation's and review
between multiple sets of data, record, – Computer automatically performs
documents and physical assets comparisons or matching. An exception
report is reviewed and investigated. e.g.
• Study Chapter 5 page 165-170 of the computer can compare CAUA031 Test
Auditing Fundamentals for a detailed 1 marks between 2017 and 2018. A report
can be extracted for exceptions where the
list pass rate dropped/increased significantly.
Processing Controls
Processing controls ….continued

• Processing controls Consequences if processing


 Occurs in computer: little/no user controls fails
intervention
• Data being lost, corrupted or
 Integrity of data while being changed
processed
 Examples: saving a file, updating • Existing data being duplicated
a file (after input), generating a
report • Invalid data being added
during processing
• Calculation or accounting errors
occurring
• Logical and rounding errors
occurring
• Incorrect version of the program
or data file being used
Processing Controls…..continued

• 2. Processing controls (continued)


 User-related controls
 Correct program and file
 Computer control totals and reports
 Controls during processing
 Review, reporting and exception monitoring
 Error correction process
 Also refer input controls.
Processing controls…..continued

User related controls Correct program and file


controls
• Relate to access and
Isolation of responsibility • Correct version and data file
should be used
• Files should be have clear
external name labels
• They should be process schedule
or register linking production run
with a specific time and date
Processing controls…..continued

Computer Control Totals Controls during processing


• Control totals to be • Controls in the computer detects
reconciled with control total errors or any missing number
automatically by the • e.g. A completeness test identify
computer after processing missing reference numbers during
e.g. the processing of data
• Financial fields-sums all
financial data such as total
amount invoiced
Output controls
• Involves distribution of data
from stored to viewed Consequences if Output
Controls fail
• Hard-copy document, on-
screen display etc. • Output being distributed to
unauthorised persons
• Output valid, accurate
complete; authorised parties • Output being incomplete or
only. inaccurate, which can result
in incorrect management
decisions or
• Output not agreeing with the
underlying
Output Controls…..continued
 User-related controls such as limiting access to the output
 Controls around the distribution of output
 Controls applicable when receiving output
 Review, reporting and exception monitoring
 Error correction process.
Output controls……..continued
• Controls implemented

Controls over
User related Controls on Error Correction
distribution of
Controls receiving output process
output
• Access control • Should be • Reconciliation • Refer to
over printer, written policy on of input to prescribed
screen how the output output textbook: Audit
• Controls over and confidential • Performing Fundamentals
actual output information is output count
e.g. marked treated • Checking if
confidential and • Must be a blank pages
emails manual or contain words
encrypted electronic such as ‘empty
register during page’
distribution of
output
Masterfile Change Controls

Debtors
Masterfile

Payroll Creditors
Masterfile Masterfile Masterfile

Inventory
Masterfile
Masterfile change control……..continued
• When standing data • Consequences if master file
changed, added, deleted change controls fail.

• Requested by user, not • Unauthorised amendments


computer • Not all authorised
amendments being updated
• E.g.: Debtors/creditors on master file
details, price lists, inventory
details • Errors in capturing
amendments
• Standing data used
repeatedly when • Errors contained in the master
transactions processed file data going undetected

• If data error in master file:


data errors in all affected
transactions
Masterfile change control…..continued
• 4. Master file change controls (continued)
 User-related controls
 Request forms
 Input controls
 Review, reporting and exception monitoring
 Review of standing data
Masterfile change control……..continued
• Controls implemented
Controls for advanced technologies

 Substance of controls remains same in advanced system


 Process to follow when implementing/evaluating controls over any
form of technology:
• Understanding of the technologies
• Risks
• Existing controls
• Break down into components (security, custody, input
• Actual vs theoretical controls
• Evaluate impact of existing controls
• Select suitable controls. (refer next slide for detailed process)
Other Controls over advanced technology……continued
 Data communication • Process followed when
• Electronic data transmission implementing or evaluating
controls over any technology
• Fixed-line, wireless, etc.
1. Obtain an understanding of
 Controls that should be in place the technology used
over data communication
2. Identify relevant risk
3. Identify and evaluate
adequacy of existing
controls
4. Break technology into
components: Security,
Custody, Input, processing
5. Select suitable controls
Electronic commerce, electronic funds transfers and other data
communication

 Electronic commerce: buying/selling over


electronic platform
• Electronic Communications and Transactions Act,
2002.

 Examples of primary risks with electronic


communication.
Electronic commerce, electronic funds transfers
and other data communication
Electronic commerce, electronic funds transfers and other
data communication
 Controls:
• Input controls (at capturing)
• Restricting, authenticating user (Access Controls)
• Data transfer internet(similar to processing controls)
• Legal matters (policies and procedures over privacy
• Continuity( Storage, system development by service organization)
• Logs and reviews
• Other. (Assurance logos)

Refer Auditing Fundamentals


Chapter 5 for risks and detailed
controls.
Service organisations, outsourcing and data warehousing

 Outsourcing: performed by 3rd party (“service organisation” - SO)


rather than company itself

 Data warehousing: store data on SO’s server for a fee

 Most important issues relating to data:


• Transfer from company to SO
• Ownership
• Security, protection at SO
• Losses.

Refer Auditing Fundamentals


Chapter 5 for risks and detailed
controls.
EFT controls: Components
 Capturing of data
 Restricting access of users and authenticating users
 Transfer of data over the internet
 Protecting against losses
 Policies and procedures
 Logs and reviews
 Other specialised controls.

Refer to Appendix of Auditing


Fundamentals Chapter 5 for risks and
detailed controls.

You might also like